No one has fully figured out how to throw a security blanket over the enterprise mobile environment, that chaotic patchwork of geographies, carriers, operating systems, applications, device types and ownership models.
Any enterprise tackling web security for mobile devices must… Continue reading
We’re coming up on a May 27 OASIS virtual session 11 AM EDT session:
Can the Internet of Things be secure? The impact on privacy and data control with Jamie Clark, Mark O’Neill, Dan Blum and Jonathan Rodriguez. For full… Continue reading
Lately the proposals for “identity oneness” are back in force. And for me, deja vu. I’ve been through the year of PKI and so many grand efforts that I long ago came down on Kim Cameron’s side that what we… Continue reading
For all that authentication vendors may proclaim “the death of passwords,” the pesky things aren’t going away. In fact, I don’t think they should. However, I’ll be the first to acknowledge how broken password authentication is in current practice. Sardonically… Continue reading
My wife’s always “watching the detectives” (per the title of that old Elvis Costello song) and sometimes I join her. But nowadays she’s not “filing her nails as they’re dragging the lake,” instead she’s painting her toenails as the NCIS… Continue reading